General

  • Target

    e8c01da98b8c3d203f2e9091348b9c56a471d3b0baf589ea3d195704f54d15e8

  • Size

    3.2MB

  • Sample

    220521-njdwqaghem

  • MD5

    5457d3f8855af52609bdfd7fc7b88bc4

  • SHA1

    1639bee5bec6557d11f7ed0743ad2857676f36bc

  • SHA256

    e8c01da98b8c3d203f2e9091348b9c56a471d3b0baf589ea3d195704f54d15e8

  • SHA512

    5329a079959747d0290acd6444159c4c1f9984c0780a07b9081ecff7db9d046ab5d4546bd58ddae91ce9da7cbf04edfbdbe8ff836e60894eef5b8fd81d439769

Malware Config

Targets

    • Target

      e8c01da98b8c3d203f2e9091348b9c56a471d3b0baf589ea3d195704f54d15e8

    • Size

      3.2MB

    • MD5

      5457d3f8855af52609bdfd7fc7b88bc4

    • SHA1

      1639bee5bec6557d11f7ed0743ad2857676f36bc

    • SHA256

      e8c01da98b8c3d203f2e9091348b9c56a471d3b0baf589ea3d195704f54d15e8

    • SHA512

      5329a079959747d0290acd6444159c4c1f9984c0780a07b9081ecff7db9d046ab5d4546bd58ddae91ce9da7cbf04edfbdbe8ff836e60894eef5b8fd81d439769

    • Anubis banker

      Android banker that uses overlays.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks